Apparatus and methods to store permission data relating to security for a system and to receive a request to establish a telephony call. In response to the request, the telephony call is established, and after establishing the telephony call, an indication of a type of the telephony call is detected. Based on permission data relating to security for the system, it is determined whether the type of the telephony call is permitted.
|
23. A modem comprising:
a microcontroller to:
receive a request to establish a telephony call;
in response to the request, establish the telephony call;
after establishing the telephony call, detect for an indication of a type of the telephony call; and
determine, based on the indication and permission data relating to a target security level, whether the type of the telephony call is permitted.
1. A method of communications in a system, comprising:
storing permission data relating to security for the system;
receiving a request to establish a telephony call;
in response to the request, establishing the telephony call;
after establishing the telephony call, detecting for an indication of a type of the telephony call; and
determining, based on the permission data relating to security for the system, whether the type of the telephony call is permitted.
13. A system comprising:
a storage to store permission data relating to security for the system;
an interface to receive a request for a telephony call; and
a control element adapted to:
establish the telephony call in response to the request;
receive an indication of a type of the telephony call during the telephony call; and
determine, based on the indication and the permission data relating to security for the system, whether the type of the telephony call is permitted.
5. The method of
6. The method of
7. The method of
8. The method of
9. The method of
10. The method of
11. The method of
12. The method of
14. The system of
15. The system of
16. The system of
17. The system of
18. The system of
19. The system of
21. The system of
22. The system of
24. The modem of
25. The modem of
26. The modem of
27. The modem of
|
This is a continuation of U.S. Ser. No. 09/327,896, filed Jun. 8, 1999, now U.S. Pat. No. 6,647,099, which claims the benefit under 35 U.S.C. § 119(e) of U.S. Provisional Patent Application Ser. No. 60/088,449 filed Jun. 8, 1998, both of which are hereby incorporated by reference.
A modem is a device that has traditionally allowed a computer system to transmit and receive data over a telephone line. Today, many modems can transmit voice and fax as well as data. Modems are currently implemented in a variety of ways. For example, a host based “controllerless” modem typically includes a codec on a peripheral board, but the modem controller code is executed by a host processor. A native signal processing modem typically implements a signal processing component on the host system itself to generate modem signals. Peripheral modems processor in conjunction with a modem microcontroller, and a strictly digital signal processor oriented approach. All of these approaches, however, provide for code that is either executed by the host processor, the microcontroller on the modem itself, or the digital signal processing code to implement the modem functionality. These approaches necessarily enhance the flexibility of modems, especially when this code is implemented in a flash ROM. This is because the modem can be reconfigured to adapt it to new implementations of communication protocols and to add other features that may be desirable in the modem.
While modem interfaces are standardized a number of different communications protocols for formatting data, to be transmitted over telephone lines exist. For example, standardized communication protocols include: Bell 103, CCITT V.21, Bell 212A, ITU V.22, ITU V.22bis, ITU V.29, ITU V.32, ITU V.32bis, ITU V.34, and ITU V.90. These and other protocols are well known to those of ordinary skill in the art. In many modems, flash ROMS have been utilized to enable the upgrading of communications protocols.
Telephony is the science of translating sound into electrical signals transmitting them through a medium and then converting back to sound. Computer telephony integration (CTI) refers to computer systems that enable a computer to act as a call center accepting incoming calls and routing them to the appropriate device or user. Currently, CTI systems have advanced such that most are capable of handling incoming and outgoing communications that include: phone calls (voice), faxes, and Internet messages. The advance in CTI has, in part, been aided by advance in software interfaces. One such interface is telephony application program interface (TAPI). TAPI is an application programmer interface (API) designed to connect a computer system running a windows-based program or operating system to telephone services. TAPI is well known to those of ordinary skill in the art. Another interface that is of particular interest to device driver developers is telephony service provider interface (TSPI). The TSPI is a software interface that sets between a Windows telephony dynamic link library (DLL) and a hardware specific device driver that is also known as a telephony service provider (TSP). The TSP provides an interface to the telephony hardware. The TSPI is well known to those of ordinary skill in the art.
In a typical local area network (LAN) a network firewall determines which LAN services are available from outside of the LAN and what outside services are available to those internally connected to the LAN. For the network firewall to be effective all outside traffic must pass through the firewall where it can be inspected. When performing as designed, the firewall permits only authorized traffic to pass and blocks dubious traffic. Unfortunately, the firewall cannot offer any protection once an attacker has gotten through or around the firewall. For example, if unrestricted dialout is permitted from inside the protected network internal users can make a direct serial line Internet protocols (SLIP) or point-to-point protocol (PPP) connection to an Internet service provider (ISP). These types of connections bypass the security provided by even the most carefully constructed firewall and create a significant opportunity for backdoor attacks.
The system according to some embodiments of the invention implements a modem or modem driver with a variety of desirable features. These features include the ability to individually enable or disable inbound data, outbound data, inbound fax, outbound fax, inbound voice, and outbound voice. These capabilities may be individually enabled or disabled by an administrator thereby controlling and authorizing user operations. In one embodiment a bit mask representing permission states is stored in modem associated memory. Each feature has an assigned bit in the bit mask. This modem associated memory may be RAM, ROM, EPROM, EEPROM or flash ROM. When the modem memory is flash ROM the states may be changed by an administrator via software.
Turning to
The host processor 10 can be a Pentium® (manufactured by Intel Corporation) or any other appropriate processor. The memory controller 102 controls system memory 104. The system memory 104 would include dynamic random access memory (DRAM) appropriate for a given processor. The computer system S utilizes Flash read only memory (ROM) (not shown) to implement the preferred embodiment of the invention. The graphics adapter 108 is coupled to a monitor 110. Again, the disk controller 114 controls floppy disks disk drive 116 and hard disk drive 118. The serial interface 112 couples the computer system S to a telephone line. The serial interface 112 may couple the computer system S to the telephone line directly (in the case of a software modem) or couple the computer system S to a modem (not shown). In the latter configuration, the modem will in turn couple the computer system S to the telephone line.
A software or firmware based modem typically allows for enhanced operating system compared to a hardware modem. This is because using software enables permissions to be set in order to establish a COS for an individual user and/or groups of users within an organization. Permissions are individual privileges assigned to a user or a group of users, which allow or disallow for specific operation. Permissions may be established in order to establish security requirements or otherwise control usage of enterprise resources to promote good business practices. Utilizing permissions for added security can result in a flexible back-up firewall. For example, when outbound data calls are not permitted no communication application package can establish outbound data communications. Utilizing permissions in this manner allow an individual feature to be disabled at the lowest level—that is in a modem's hardware, firmware or driver-stack.
Permissions can be set via a stand-alone utility or through an embedded software flash utility. In one embodiment, an administrator can set various permissions remotely via a centralized location. For example, the administrator might utilize System Management Server (SMS), Policy Editor, Insight Manager, Carbon Copy, PC Anywhere or any other facility that provides remote access. These and other tools that assist the administration of LANS are well known to those of ordinary sill in the art. When embedded into intelligent application creative features which can augment system command and control may be implemented. For example, modem resources could be shut down in real time when a problem occurs by toggling one or more permission bits.
Turning to
Moving to
A second interface, a telephony service provider interface (TSPI) is also a software interface. The TSPI resides between a Windows telephony DLL and what are known as telephony service providers (TSPs). The TSPs are hardware specific device drivers, which provide the interface to the telephony hardware. When one of the TSPs is coupled to a modem that TSP can function to translate a TSPI request, for example, to a number to be dialed.
The control of flow through the TAPI 206 is further illustrated in
There are several other ways in which administrative control can be implemented. Registry settings may be used to control the enabling and disabling of the permission bits. This is accomplished by writing a zero or a one, “true”/“false”, “yes”/“no”, “on”/“off”, or other appropriate value to the specific permission bit. For example, a value of zero would be used to disable a feature and a value of one would be used to enable the same feature. Such registry values could appear as:
My Computer
HKEY_LOCAL_MACHINE
Security
Modem
Data_receive Ox 1
Data transmit Ox 1
Fax_receive Ox 1
Fax_transmit Ox 1
Voice_transmit Ox 1
Voice_receive Ox 1
Security aware application can poll these keys and dynamically set and reset the permissions via the TAPI or using direct calls to the firmware. Assuming such an application or utility is available to an administrator, the administrator can dynamically issue commands to the firmware. As previously discussed, administrators can use the Policy Editor employed on NT systems, SMS, PC Anywhere, or Carbon Copy to change these values. In addition COS groups can also be associated with server based installation of product software. Utilizing SMS, package definition files (PDF), will also allow the administrator to establish different classes of services for different users. For example, the administrator could create an installation folder on a server with the PDF COS for the sales group and a different PDF COS for the marketing group.
In another embodiment, a flash utility can also be used to send commands directly to the modem firmware via proprietary commands. These commands would be dependent on the architecture used by the designer. Upon launch of the application a simple graphical user interface (GUI) or character based interface prompts the user to enter a password. Upon successful entry the administrator can change the password or select appropriate check boxes. This utility would be particularly useful for local client administration.
On telephone lines call discrimination is typically performed when a connection is made between a called party and a calling party. Turning to
The FSK tone is indicative of a data call. In step 310 the inbound data permissions are read. If inbound data calls are allowed control passes to step 320, where the call is received. If inbound data calls are not allowed then control passes to step 318, where the line is disconnected. From step 308, when the called party's modem does not detect an FSK tone control passes to step 312. In step 312 the called party's modem detects whether there is a CNG tone, a fax answer tone, or fax training tones. All of these tones are indicative of a fax call. If a CNG tone exists control passes to step 314. In step 314 the inbound fax permission are read. If an inbound fax call is allowed control passes to step 320. In step 320 the inbound fax is received. Otherwise, control is passed to step 318 where the line is disconnected.
Note that although the modem discriminator is shown as sequentially detecting the FSK and the CNG incoming signals, in actual practice this is typically done simultaneously.
Turning to
Although the disclosed embodiment is principally directed to software modem, such as controllerless modem implemented on a host system or a digital signal processor, the techniques according to the invention could be similarly implemented employing a modem driver in conjunction with a standard hardware modem that supports telephony features. For example, the modem driver capable of intercepting modem communications at a very low level could include the data, fax, and voice permissions, and disconnect calls that did not meet the required permissions. Preferably, for heightened security the ability to selectively allow or disallow different types of ingoing and outgoing modem calls is implemented at a firmware level within either a host system or the modem itself. In an environment where security is not of paramount importance, or where it is known that the operating system executing on the computer is extremely secure, the selective passing of desired types of calls could be implemented at the driver level.
Also, although the present modem has been disclosed as being implemented with an analog line modem, the examples given could similarly be used on BRI ISDN, PRI ISDN, or other digital transports as well.
The foregoing disclosure and description of the invention are illustrative and explanatory thereof, and various changes in the size, shape, materials, components, circuit elements, wiring connections and contacts, as well as in the details of the illustrated circuitry and construction and method of operation may be made without departing from the spirit of the invention.
In the foregoing description, numerous details are set forth to provide an understanding of the present invention. However, it will be understood by those skilled in the art that the present invention may be practiced without these details. While the invention has been disclosed with respect to a limited number of embodiments, those skilled in the art will appreciate numerous modifications and variations therefrom. It is intended that the appended claims cover such modifications and variations as fall within the true spirit and scope of the invention.
Patent | Priority | Assignee | Title |
7321655, | Feb 07 2005 | AVAYA LLC | Caching user information in an integrated communication system |
7400879, | Mar 04 2001 | Extreme Networks, Inc | Method for conducting mobile communications for a network |
7564954, | Feb 07 2005 | AVAYA LLC | Form-based user interface for controlling messaging |
7724880, | Feb 07 2005 | AVAYA LLC | Networked voicemail |
7808980, | Feb 07 2005 | AVAYA LLC | Integrated multi-media communication system |
7885275, | Feb 07 2005 | AVAYA LLC | Integrating messaging server directory service with a communication system voice mail message interface |
7907704, | Feb 07 2005 | AVAYA LLC | Caching user information in an integrated communication system |
8064576, | Feb 21 2007 | AVAYA LLC | Voicemail filtering and transcription |
8107598, | Feb 21 2007 | AVAYA LLC | Voicemail filtering and transcription |
8160212, | Feb 21 2007 | AVAYA LLC | Voicemail filtering and transcription |
8175233, | Feb 07 2005 | AVAYA LLC | Distributed cache system |
8223934, | Dec 27 2006 | ARRIS ENTERPRISES LLC | Method of restricting use of a PacketCable SIP or NCS E-MTA line to fax-only |
8233594, | Feb 07 2005 | AVAYA LLC | Caching message information in an integrated communication system |
8391461, | Feb 07 2005 | Avaya Inc. | Caching user information in an integrated communication system |
8488751, | May 11 2007 | AVAYA LLC | Unified messenging system and method |
8559605, | Feb 07 2005 | AVAYA LLC | Extensible diagnostic tool |
Patent | Priority | Assignee | Title |
4546213, | Apr 25 1984 | Modem security device | |
4680773, | Oct 30 1985 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Data telecommunications system and method utilizing a multi-mode modem |
4850008, | Feb 29 1988 | Extel Corporation | Method and apparatus for discrimination between different kinds of data transmission |
4905281, | May 04 1988 | Halliburton Company | Security apparatus and method for computers connected to telephone circuits |
4958153, | Apr 08 1987 | NEC Corporation | Method and apparatus for priority control of incoming calls at ISDN terminals |
5048076, | Jan 16 1990 | LOGIX INC | Control apparatus for an automated telephone attendant |
5081621, | Apr 05 1988 | Hitachi, Ltd. | Method and apparatus for controlling data communication on a multi-network |
5131025, | Nov 25 1987 | Omron Tateisi Electronics Co. | Intelligent modem system which determines proper access thereto |
5146472, | Mar 28 1990 | Silicon Laboratories Inc | Method for imbedding information in modem handshake procedure and modems incorporating the same |
5153918, | Nov 19 1990 | BIOMETRIC 2000, INC | Security system for data communications |
5276687, | Apr 14 1989 | Fujitsu Limited | Network system having different attributes of terminal equipment devices |
5313653, | Jan 30 1992 | MOTOROLA SOLUTIONS, INC | Method for a communication unit to maintain a data base of system services |
5436957, | Dec 24 1992 | Verizon Patent and Licensing Inc | Subscriber control of access restrictions on a plurality of the subscriber's telephone lines |
5440619, | Aug 11 1993 | Zoom Telephonics, Inc.; ZOOM TELEPHONICS, INC | Voice, data and facsimile modem with modified ringback answering |
5471522, | Aug 04 1993 | Intel Corporation | Telephone line sharing for a personal computer system |
5481562, | Nov 03 1989 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | Multi-mode modem and data transmission method |
5483596, | Jan 24 1994 | PARALON TECHNOLOGIES INC | Apparatus and method for controlling access to and interconnection of computer system resources |
5495483, | Jan 26 1995 | MOTOROLA SOLUTIONS, INC | Method and apparatus for allocating carrier channels |
5499287, | Nov 12 1992 | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | FAX-telephone interface circuit |
5546448, | Nov 10 1994 | Multi-Tech Systems, Inc.; MULTI-TECH SYSTEMS, INC | Apparatus and method for a caller ID modem interface |
5724426, | Jan 24 1994 | Paralon Technologies, Inc. | Apparatus and method for controlling access to and interconnection of computer system resources |
5761288, | Jun 05 1995 | Mitel Networks Corporation | Service context sensitive features and applications |
5815682, | Dec 13 1994 | Microsoft Technology Licensing, LLC | Device independent modem interface |
5864710, | Jul 22 1996 | Hewlett Packard Enterprise Development LP | Controllerless modem |
5878142, | Jul 12 1994 | SAFENET, INC | Pocket encrypting and authenticating communications device |
5884262, | Mar 28 1996 | Verizon Patent and Licensing Inc | Computer network audio access and conversion system |
5938745, | Jun 25 1997 | Crimson Corporation | Arbitrator for modem in a system without shared process space that passes a duplicate handle to a first listening application with matching identification string |
5946386, | Mar 11 1996 | Wilmington Trust, National Association, as Administrative Agent | Call management system with call control from user workstation computers |
6167123, | Sep 20 1996 | UNIFY, INC | One number voice fax data PBX call discrimination |
6249575, | Dec 11 1998 | SecureLogix Corporation | Telephony security system |
6298122, | Dec 07 1998 | CURIO LTD | Caller ID system |
6327343, | Jan 16 1998 | Nuance Communications, Inc | System and methods for automatic call and data transfer processing |
6647099, | Jun 08 1998 | HTC Corporation | Administrative control and security of modems |
Executed on | Assignor | Assignee | Conveyance | Frame | Reel | Doc |
Oct 01 2002 | Compaq Information Technologies Group LP | HEWLETT-PACKARD DEVELOPMENT COMPANY, L P | CHANGE OF NAME SEE DOCUMENT FOR DETAILS | 014628 | /0103 | |
Sep 17 2003 | Hewlett-Packard Development Company, L.P. | (assignment on the face of the patent) | / |
Date | Maintenance Fee Events |
Jun 21 2010 | M1551: Payment of Maintenance Fee, 4th Year, Large Entity. |
Aug 01 2014 | REM: Maintenance Fee Reminder Mailed. |
Dec 19 2014 | EXP: Patent Expired for Failure to Pay Maintenance Fees. |
Date | Maintenance Schedule |
Dec 19 2009 | 4 years fee payment window open |
Jun 19 2010 | 6 months grace period start (w surcharge) |
Dec 19 2010 | patent expiry (for year 4) |
Dec 19 2012 | 2 years to revive unintentionally abandoned end. (for year 4) |
Dec 19 2013 | 8 years fee payment window open |
Jun 19 2014 | 6 months grace period start (w surcharge) |
Dec 19 2014 | patent expiry (for year 8) |
Dec 19 2016 | 2 years to revive unintentionally abandoned end. (for year 8) |
Dec 19 2017 | 12 years fee payment window open |
Jun 19 2018 | 6 months grace period start (w surcharge) |
Dec 19 2018 | patent expiry (for year 12) |
Dec 19 2020 | 2 years to revive unintentionally abandoned end. (for year 12) |